We provide IT Staff Augmentation Services!

Information Security Analyst Resume

5.00/5 (Submit Your Rating)

Philadelphia, PA

TECHNICAL SKILLS:

  • Splunk
  • Qradar
  • Fire Eye
  • Qualys Vulnerability Scanning Tool
  • DLP

WORK EXPERIENCE:

Confidential, Philadelphia, PA

Information Security Analyst

  • Monitor and resolve suspicious and potentially malicious network activity with the use of SIEM solutions Splunk & Qradar. I use these tools to monitor network activity as well as checking logs on an as needed basis
  • Investigate malicious activity on end user machines with the use of FireEye as well as eliminating the threat while keeping the user updated on the progress
  • Monitor the sending of PII information through our Data Loss Prevention (DLP) tool. Make sure any unencrypted PII information has not been sent to any parties who are not meant to receive it while educating users who violate this policy on how to properly encrypt PII information
  • Responsible for running vulnerability scans on all assets being accounted for in out data centers. Responsible for mapping assets as well as adding/removing any assets from the monthly list. Responsible for creating vulnerability reports on a monthly basis as well as detailing potential solutions for the vulnerabilities with the highest amount of instances
  • Investigate suspicious emails to determine if the email is malicious as well as analyzing suspicious attachments through the use of a sandbox environment

Confidential, North Brunswick, NJ

IT Security Specialist

  • Ensuring all company hardware and software meets minimum security baseline. This includes making sure all hardware and software is up to date on configurations and security patches. Developed Smart Source’s security plan pertaining to their internal network. Bitdefender Internet Security 2015 was used. Ensuring sensitive company files have the proper security configuration and can only be accessed by the appropriate individuals. Ensuring all devices connected to the company network matches an authorized security profile. Ensuring any unauthorized access of the company network and its files is documented and logged to determine the severity and risk associated with the access attempt. Running anti - malware and virus programs on all company hardware and software to ensure there are no breaches of security. Created regular backups of all files on company machine to improve the safety of sensitive information. Conducted vulnerability scans of our machines and servers using Advanced IP scanner and was in charge of restoring machines in the event of a network compromise. Trained Smart Source employees in what to look for regarding suspicious activity that may occur on the network.

Confidential, Albany, NY

Data Standardization, Team Lead

  • In charge of a data standardization team consisting of five individuals.
  • Responsible for screening, hiring training and daily oversight of the team on the use of NYEHMS, a data repository tool developed for New York Department of Health to standardize hundreds of thousands of physician records.
  • Coordinated with the database administrator with respect to both quality and quantity of data standardization efforts.

We'd love your feedback!